Shopping Cart

No products in the cart.

AAMI TIR80001 2 1 2012

$140.32

AAMI/IEC TIR80001-2-1:2012 – Application of risk management for IT-networks incorporating medical device-Part 2-1: Step by step risk management of medical IT-networks; Practical applications and examples

Published By Publication Date Number of Pages
AAMI 2012 76
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

Step-by-step guide to help in the application of risk management when creating or changing a medical IT-network.

PDF Catalog

PDF Pages PDF Title
1 ANSI/AAMI/IEC TIR80001-2-1:2012, Application of risk management for IT-networks incorporating medical devices — Part 2-1: Step by step risk management of medical IT-networks; Practical applications and examples
3 Title page
4 Copyright information
5 AAMI Technical Information Report
ANSI Technical Report
6 Contents
9 Glossary of equivalent standards
12 Committee representation
13 Background of ANSI/AAMI adoption of IEC/TR 80001-2-1:2012
14 FOREWORD
16 INTRODUCTION
17 1 Scope
2 Normative references
3 Terms and definitions
23 4 Prerequisites
5 Study of terms used in risk management
5.1 Overview
24 5.2 Hazards
5.3 Hazardous situations
25 5.4 Foreseeable sequences of events and causes
5.5 Unintended consequence
26 5.6 Risk control measures (mitigations)
27 5.7 Degrees of risk
5.8 Checking wording
28 6 The steps
6.1 Overview of the steps
6.2 A basic example using the 10 steps
6.2.1 General
6.2.2 Initial risk – Steps 1 – 5 (Figure 2)
29 6.2.3 Risk control and final risk – Steps 6 – 10 (Figure 3)
32 7 IEC 80001-1:2010, Subclause 4.4: Step by step
7.1 General
7.2 Application of Subclause 4.4.1: Document all risk management elements
7.3 Note about risk evaluation
7.4 The 10-step process
7.4.1 STEP 1: Identify hazards and hazardous situations
33 7.4.2 STEP 2: Identify causes and resulting hazardous situations
7.4.2.1 General
7.4.2.2 Multiple causes per hazardous situation
34 7.4.2.3 Multiple hazardous situations per cause
7.4.3 STEP 3: Determine unintended consequences and estimate the potential severities
7.4.4 STEP 4: Estimate the probability of unintended consequence
7.4.4.1 General
7.4.4.2 Probability estimations
35 7.4.5 STEP 5: Evaluate risk
36 7.4.6 STEP 6: Identify and document proposed risk control measures and re-evaluate risk (return to Step 3)
7.4.6.1 General
7.4.6.2 Identify risk control measures
37 7.4.6.3 Select risk control measure
7.4.6.4 Re-evaluate risk
7.4.6.5 Risk/benefit analysis
7.4.7 STEP 7: Implement risk control measures
7.4.8 STEP 8: Verify risk control measures
7.4.8.1 General
38 7.4.8.2 Verification of effectiveness
7.4.8.3 Verification of implementation
7.4.9 STEP 9: Evaluate any new risks arising from risk control
39 7.4.10 STEP 10: Evaluate and report overall residual risk
7.5 The steps and their relationship to IEC 80001-1 and ISO 14971
41 8 Practical examples
8.1 General
8.2 Example 1: Wireless patient monitoring during patient transport
8.2.1 Full description of context
8.2.2 Description of network under analysis
8.2.3 The 10 Steps
44 8.3 Example 2: Remote ICU / Distance medicine
8.3.1 Full description of context
8.3.2 Description of network under analysis
8.3.3 The 10 Steps
47 8.4 Example 3: Post Anesthesia Care Unit (PACU)
8.4.1 Full description of context
8.4.2 Description of network under analysis
48 8.4.3 The 10 Steps
53 8.5 Example 4: Ultrasound – Operating System (OS) vulnerability
8.5.1 Full description of context
8.5.2 Description of network under analysis
8.5.3 The 10 Steps
57 Annex A (informative) Common hazards, hazardous situations, and causes to consider in medical IT-networks
A.1 Typical hazards in medical it-networks
A.2 Types of hazardous situations
58 A.3 Common causes in medical IT-networks
A.4 Relationship between required network characteristics and hazards
59 A.5 Relationship between hazards, foreseeable sequences, and causes
61 A.6 Hazards, causes, foreseeable sequences, and hazardous situations
62 Annex B (informative) List of questions to consider when identifying hazards of the medical IT-network
63 Annex C (informative) Layers of medical IT-networks where errors can be found
C.1 Overview
C.2 Errors and faults
66 Annex D (informative) Probability, severity, and risk acceptability scales used in the examples in this technical report
69 Annex E (informative) Monitoring risk mitigation effectiveness
E.1 Overview
E.2 Verify the effectiveness of risk control measures
E.3 Verify the effectiveness of inherent key property control by design
70 E.4 Verify the effectiveness of protective measures
E.5 Verify the effectiveness of information for key properties to mitigate risk
E.6 Verification of the design and execution of the risk management process
72 Annex F (informative) Risk analyzing small changes in a medical IT-network
73 Annex G (informative) Example of Change Window Form
74 Annex H (informative) Template for examples
76 Bibliography
AAMI TIR80001 2 1 2012
$140.32